Journals in DBLP
Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:390-406 [Journal ] L. G. Lawrence RACIF security goals comment on a paper by R. Paans. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:407-411 [Journal ] Geoff Norman PC security issues. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:412-416 [Journal ] Belden Menkus The lessons of the Great Chicago flood of 1992. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:417-420 [Journal ] David L. Lathrop Security aspects of wireless local area networks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:421-426 [Journal ] Fritz Bauspieß , Frank Damm Requirements for cryptographic hash functions. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:427-437 [Journal ] Helen A. Bergen , James M. Hogan Data security in a fixed-model arithmetic coding compression algorithm. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:445-461 [Journal ] William J. Caelli , Anthony W. Rhodes , N. C. Russell An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:463-479 [Journal ]